ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Infographic: Top 12 risk management skills

    Sponsored by: ComputerWeekly.com

    Risk management is a must for anyone who aspires to be a leader or manager. There is risk to be addressed at all business levels, and if a leader is unable to manage risk, their upward mobility will disappear. Here are some skills needed to be a successful risk manager.

  • Network security in the post-pandemic era

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.

  • Infographic: 7 steps to secure your home wi-fi network

    Sponsored by: ComputerWeekly.com

    Wi-Fi security, in particular, has evolved. While the days of war driving and finding home networks open to exploit may be over, home Wi-Fi security could still go sideways in many places. Here are seven recommendations to make sure your home Wi-Fi network is secure.

  • A Computer Weekly e-guide on Network Visibility, Performance and Monitoring

    Sponsored by: ComputerWeekly.com

    Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.

  • Implementing a Zero-Trust Approach to Network Security

    Sponsored by: TechTarget

    Implementing zero trust requires creating detailed policies and devising certain "hoops" through which those wanting access to critical infrastructure must jump. Not an easy task. Luckily, searchSecurity is here to help. Participate in our IAM research program for access to our guide, Implementing a Zero-Trust Approach to Network Security.

  • Ofcom raise over £1.3bn for new 5G spectrum auction

    Sponsored by: ComputerWeekly.com

    In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.

  • A Computer Weekly e-guide on Network Visibility, Performance and Monitoring

    Sponsored by: ComputerWeekly.com

    Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.

  • The CISO's guide to supply chain security

    Sponsored by: ComputerWeekly.com

    Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.

  • A Computer Weekly Buyers Guide to 5G

    Sponsored by: ComputerWeekly.com

    Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.

  • How Next-Gen SD-WAN is driving the SASE revolution

    Sponsored by: Palo Alto Networks

    In response to growing networking and security challenges in the digital era, Gartner created the concept of Secure Access Service Edge (SASE) to help organizations embrace the future of network security. Watch this webinar to learn more about the SASE revolution and why it’s dependent on a new approach to SD-WAN.

  • Five Critical Requirements for Internal Firewalling in the Data Center

    Sponsored by: VMware Intel

    This white paper looks at the shocking state of network security and how many organizations could benefit by securing traffic in the data center with a new approach: using a distributed, service-defined internal firewall. Download to learn about VMware NSX’s Service-Defined Firewall and its potential impact on visibility, compliance, and more.

  • Securing the Data Center in Just Four Steps

    Sponsored by: VMware Intel

    Appliance-based security has proven incapable of keeping up with securing east-west traffic. But this white paper looks at an alternative approach: a distributed internal firewall. Learn about VMware’s own version of this offering – their Service-defined Firewall – and uncover 4 steps to improving security in the data center.

  • DNS - Top cybersecurity trends 2021: Pandemic-related content used for attack propagation

    Sponsored by: Cisco Umbrella

    In the face of new and rising pandemic-related threats, it's more important than ever to ensure that all web traffic is inspected and protected, so people can get the information they need — without getting compromised. Find out how to keep your employees safe from these types of attacks in 2021.

  • The rise of edge computing

    Sponsored by: ComputerWeekly.com

    The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture

  • It’s Time to Ditch the VPN for Zero Trust

    Sponsored by: Tanium

    In this white paper, examine what kick-started the zero-trust movement, why it's completely changed the conversation around network security, how Tanium and its partners' capabilities contribute to a zero-trust solution. Read on to learn more.

  • Fortisase—Cloud-Delivered Security To Every User, Everywhere

    Sponsored by: Fortinet, Inc.

    In order to extend secure access and high-performance connectivity to a growing remote workforce, organizations are looking to integrate Secure Access Service Edge (SASE) solutions. Read this solution brief for a closer look at the key features and capabilities of Fortinet’s SASE offering – known as FortiSASE.

  • Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato

    Sponsored by: Cato Networks

    The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.

  • Measuring the ROI of Security Orchestration and Response Platforms

    Sponsored by: Splunk

    Security orchestration and response (SOAR) platforms have become the force multiplier needed to unlock the full power of an organization’s security investment by helping security teams focus on innovation rather than mundane tasks. Read this white paper to measure the ROI of SOAR.

  • The Total Economic Impact Of Palo Alto Networks For Network Security And SD-WAN

    Sponsored by: Palo Alto Networks

    Palo Alto Networks commissioned Forrester Consulting to conduct an objective Total Economic Impact study and examine the potential ROI enterprises realize when deploying Palo Alto Networks for network security and SD-WAN. Download this report to explore key findings from the study.

  • Availability and Buying Options in the Emerging SASE Market

    Sponsored by: Palo Alto Networks

    Separate networking and security infrastructures no longer fit enterprise needs. Secure access service edge, or SASE, converges the two, creating an identity-centric network environment that improves service delivery with security built in. View this research report to learn buying options for SASE and how vendors compare.

  • How a Wine and Spirits Distributor Protects its Data and Reputation with Threat Hunting

    Sponsored by: Cisco Secure

    Allied Beverage Group is a wine and spirits distributor out of Elizabeth, NJ. After building a state-of-the-art facility at HQ and implementing all-new IT infrastructure, they set out to accomplish a straightforward goal: Improve security. Access this case study to learn how threat hunting helped Allied Beverage reach their goal.

  • Ofcom raise over £1.3bn in new 5G spectrum auction

    Sponsored by: ComputerWeekly.com

    In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.

  • SASE & Zero Trust: Your Network Security Guide

    Sponsored by: Aruba Networks

    Learn about the top 5 benefits of SASE and how it enables zero-trust network access.

  • Why CISOs need advanced network security strategies now

    Sponsored by: SearchSecurity.com

    Network security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.

  • Threat detection and response demands proactive stance

    Sponsored by: SearchSecurity.com

    Cyberthreat volume, velocity and vectors are surging, taxing already stressed security teams. The time for a new cybersecurity approach is here. Threat detection and response tools are evolving just in time, as are the techniques to combat security alert fatigue.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.